Cybersecurity : Infrastructure Protection and Cybersecurity News, Information, and Analysis
Updated: 10/2/2002; 7:28:15 AM.

 
















 
 

Tuesday, September 10, 2002
Internet Crime Reporting
Cybercrime.gov was one of the billions of federal websites that I had never visited.  It has a table of how to report on a multitude of cyber crimes, everything from computer intrusion to copyright piracy.  In Utah, these crimes can all be reported through the Utah Cybercrime Task Force by sending an e-mail to cybercrime@utah.gov.  Newsfactor has a daily cybercrimes report.

9:56:10 AM    
New NIST Security Documents

NIST has just released several new security documents with standards for federal agencies.  I would suggest that state agencies pay attention to some of the NIST recommendations as well.

NIST also maintains the ICAT database, which is a searchable index of computer vulnerabilities.  The document on handling security patches suggests the creation of a patch and vulnerability group (PVG).  Looks like a good idea.  This group would be responsible for (among other things):

  1. Creating an organizational hardware and software inventory
  2. Identifying newly discovered vulnerabilities and security patches
  3. Prioritizing patch application
  4. Creating an organization-specific patch database
  5. Testing patches for functionality and security (to the degree that resources allow)
  6. Distributing patch and vulnerability information to local administrators
  7. Verifying patch installation through network and host vulnerability scanning
  8. Training system administrators in the use of vulnerability databases
  9. Deploying patches automatically (when applicable)
  10. Configure Automatic Update of Applications (when applicable).

9:29:43 AM    


© Copyright 2002 David Fletcher.



Click here to visit the Radio UserLand website.

 


September 2002
Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Aug   Oct